Governments have used computing technology since the 1950s, but data has changed. Agencies face new challenges in using data, requiring updated strategies. A recent IBM white paper covers these challenges and provides a path forward to data-driven government.

Finding the balance between privacy and security has never been more of an issue than it is today — especially in the wake of the Internet of Things (IoT) technology, which allows machines to interact with each other through signaling systems. These machine interactions allow IoT to embrace a technological revolution unlike anything we’ve seen… Read more »

With security threats facing virtually every federal institution, the vulnerability of federal agencies is top of mind of our federal government leaders. The threats are exacerbated due to the fact that many government agencies use older, legacy systems that were not designed to resist today’s threats. These systems not only increase vulnerability to computer attacks,… Read more »

If the Court agrees with Bot, it could rule that the Commission decision underpinning Safe Harbor is unlawful. That would throw a serious monkey-wrench into the bilateral data transfer framework. . . .

The Internet of Things – it’s a phrase that sounds as ominous as it is ambiguous. Many of us have heard of the Internet of Things (IoT), but everyone seems to have a different understanding of exactly what it means. Is it hardware? Software? Sensors? Is it secure? Where is it being used? Self-driving cars,… Read more »

On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in the… Read more »

Privacy and security are more important than ever, especially with the recent barrage of cyber attacks on companies like Anthem, Premera and Sony which compromised confidential data of millions of customers Privacy and security compliances are requirements that various organizations must follow to protect that same data. There are compliances that span across many industries… Read more »

My childhood was a Seinfeld script. “What’s wrong?” “Nothing’s wrong.” “Something’s wrong, I can tell.” “No, nothing.” “You’re being evasive. She’s being evasive.” “Really, I’m fine.” “Look at her, she’s like a ghost. Did somebody at school say something to you?” “Look, I don’t want to talk about it.” “A-ha! So something did happen.” “Please, just let me be. I want… Read more »